<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Privacy Risk Report &#187; ransomware</title>
	<atom:link href="https://privacyriskreport.com/tag/ransomware/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacyriskreport.com</link>
	<description></description>
	<lastBuildDate>Fri, 03 Feb 2023 16:49:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Hack Attack: Indiana Supreme Court Examines Ransomware Coverage </title>
		<link>https://privacyriskreport.com/hack-attack-indiana-supreme-court-examines-ransomware-coverage/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hack-attack-indiana-supreme-court-examines-ransomware-coverage</link>
		<comments>https://privacyriskreport.com/hack-attack-indiana-supreme-court-examines-ransomware-coverage/#comments</comments>
		<pubDate>Thu, 01 Apr 2021 15:02:41 +0000</pubDate>
		<dc:creator><![CDATA[Samantha Rothman]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Crime Insurance]]></category>
		<category><![CDATA[Indiana Supreme Court]]></category>
		<category><![CDATA[ransomware]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=2246</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/hack-attack-indiana-supreme-court-examines-ransomware-coverage/' data-emailit-title='Hack Attack: Indiana Supreme Court Examines Ransomware Coverage '>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The Indiana Supreme Court became one of the first state high courts to weigh in and issue a decision on whether crime insurance provides coverage for ransomware attacks. The trial court’s ruling in favor of Continental Western Insurance Co.’s motion for... <a class="more-link" href="https://privacyriskreport.com/hack-attack-indiana-supreme-court-examines-ransomware-coverage/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/hack-attack-indiana-supreme-court-examines-ransomware-coverage/' data-emailit-title='Hack Attack: Indiana Supreme Court Examines Ransomware Coverage '>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/hack-attack-indiana-supreme-court-examines-ransomware-coverage/">Hack Attack: Indiana Supreme Court Examines Ransomware Coverage </a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/hack-attack-indiana-supreme-court-examines-ransomware-coverage/' data-emailit-title='Hack Attack: Indiana Supreme Court Examines Ransomware Coverage '>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The Indiana Supreme Court became one of the first state high courts to weigh in and issue <a href="https://public.courts.in.gov/Decisions/api/Document/Opinion?Id=k7sliNWk8MnoIph8Sl6gPBV4rh-bwR7KZ9Lz1UtHL_M81LwnV5Q1cQfhApnjchNZ0" target="_blank">a decision</a> on whether crime insurance provides coverage for ransomware attacks. The trial court’s ruling in favor of Continental Western Insurance Co.’s motion for summary judgment upheld the denial of G&amp;G Oil Co.’s bid for coverage. The Supreme Court remanded the case because further fact-finding was necessary to uncover the “fraudulent” nature of the hacker’s actions. It was important to determine how the hacking was conducted. Therefore, until this information is uncovered, neither party was entitled to summary judgment.</p>
<p>The case arose out of G&amp;G’s purchase of commercial insurance. The policy contained various coverages, including “Commercial Crime Coverage.” There was a specific provision that provided coverage for “Computer Fraud.” Within the policy period, G&amp;G discovered it was locked out of its computer systems. A ransomware attack, a “malicious computer code that renders the victim’s computer useless by blocking access to the programs and data” had halted G&amp;G’s operations. In conjunction with the FBI, G&amp;G contacted the hackers to negotiate a price to release the server’s blockages. G&amp;G paid the requested ransom with four bitcoins, valued at approximately $35,000.</p>
<p>When G&amp;G submitted the claim to Continental, coverage was denied on the basis that hacking was excluded pursuant to the “Agribusiness Property and Incomes Coverages,” which specifically disclaimed computer hacking and viruses. Additionally, Continental believed the Bitcoin was voluntarily paid to the computer hacker, which meant the Policy’s Commercial Crime provision would not be utilized. G&amp;G filed a complaint seeking judicial enforcement of the Commercial Crime Provision. Continental filed a cross-motion for summary judgment.</p>
<p>The Supreme Court found that while these facts may give rise to fraud, there were still outlying questions. For instance, hacking can occur without fraud, but rather an inadequate security system. Therefore, until additional facts are provided, allegations of hacking were not enough to trigger coverage.</p>
<p>Additionally, the court deemed the Policy phrase, “fraudulent cause transfer” to be ambiguous. “Fraud” can range from a material misrepresentation invoking reliance to an “intentional perversion of truth.” Courts have also discussed the term “fraud” and have found it is generic and is often used in diverse ways. Therefore, the denial of coverage is likely unfounded as the Policy terms and provisions do not provide a fair basis.</p>
<p>This case is addressing this new intersection between computer fraud coverage, hacking and crime. To date, courts have had limited experience addressing each of these issues in the context of crime insurance. The evolving digital environment will likely introduce new issues that can give rise to coverage and expand existing scopes of coverage.</p>
<p style="text-align: center;">For more information about this article, contact Samantha Rothman at <a href="mailto:srothman@tresslerllp.com" target="_blank">srothman@tresslerllp.com</a>.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/hack-attack-indiana-supreme-court-examines-ransomware-coverage/' data-emailit-title='Hack Attack: Indiana Supreme Court Examines Ransomware Coverage '>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/hack-attack-indiana-supreme-court-examines-ransomware-coverage/">Hack Attack: Indiana Supreme Court Examines Ransomware Coverage </a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/hack-attack-indiana-supreme-court-examines-ransomware-coverage/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Hackers See Opportunity In Attacking Schools As They Teach Through A Pandemic</title>
		<link>https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic</link>
		<comments>https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/#comments</comments>
		<pubDate>Tue, 17 Nov 2020 16:49:23 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[PRR]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[student data]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=2206</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/' data-emailit-title='Hackers See Opportunity In Attacking Schools As They Teach Through A Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>While this year has been an unpredictable year for all data collectors, it has been especially harsh for public and private schools. In addition to various obligations on all data collectors, schools hold sensitive information belonging to children that require more obligations. ... <a class="more-link" href="https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/' data-emailit-title='Hackers See Opportunity In Attacking Schools As They Teach Through A Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/">Hackers See Opportunity In Attacking Schools As They Teach Through A Pandemic</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/' data-emailit-title='Hackers See Opportunity In Attacking Schools As They Teach Through A Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>While this year has been an unpredictable year for all data collectors, it has been especially harsh for public and private schools. In addition to various obligations on all data collectors, schools hold sensitive information belonging to children that require more obligations.  Schools must balance these obligations as they lead their students and employees through online learning during 2020. That is, to continue teaching children, most schools have had no choice but to rely on third-party applications that require entrusting this sensitive data to outside vendors. <a href="https://privacyriskreport.com/the-adoption-of-soppa-may-provide-a-tough-lesson-for-schools-that-fail-to-comply/" target="_blank">Further, many schools are facing new state laws requiring schools more steps be taken to protect student data</a>. The last thing schools need right now is an increase in ransomware attacks.</p>
<p>Of course, while many people have concerns and are grateful for schools during this time, hackers see opportunity. Namely, there are a number of new reports that schools are facing a substantial increase in ransomware targeting schools specifically. For example, on November 13, 2020, <a href="https://www.wsj.com/articles/my-information-is-out-there-hackers-escalate-ransomware-attacks-on-schools-11605279160#comments_sector" target="_blank">the Wall Street Journal addressed the uphill battle facing schools in an article titled, &#8220;<em>Schools Struggling to Stay Open Get Hit by Ransomware Attacks</em></a>.&#8221; This article examines a recent incident for a school district in Athens, Texas. As seen with many ransomware incidents, the technology chief for Athens schools, Tony Brooks, recalls one fateful day where he was contacted by school district employees reporting they could not log onto their computers. Of course, when he tried to log onto his computer, Mr. Brooks found a message stating: “All your important files are encrypted.”</p>
<p>Mr. Brooks immediately began negotiating with the hackers and, as commonly seen, he learned his school district’s hackers wanted to be paid in bitcoin. Ultimately, Mr. Brooks was able to cut off negotiations with the hackers before any payment was made when the school district come across a backup server holding the same information as the server compromised by the ransomware attack.</p>
<p>While the ransomware attack profiled in the Wall Street Journal merely costs Mr. Brooks’ school district substantial time in negotiating with the hackers and finding a fix short of paying the ransom, this situation makes it clear that school districts should not rely on luck to protect student data.</p>
<p>Another recent article, published on November 14, 2020, in the <em>Las Cruces</em> <em>Sun-News</em> entitled, &#8220;<a href="https://www.lcsun-news.com/story/news/education/lcps/2020/11/14/las-cruces-public-schools-what-ransomware-attack-taught-us/6296955002/" target="_blank">One Year Later: What the Ransomware Attack Taught Us About A Crisis</a>&#8221; provides a first-hand account of the devastating effect a ransomware attack can leave on a school district. The author, Karen Trujillo, the Las Cruces School District superintendent, recalled a ransomware attack that hit her school district a year ago: <strong> </strong></p>
<p><em>There is a day in our district’s history that will be etched in the minds of Las Cruces Public Schools for quite some time. It was Oct. 29, 2019. I had been on the job as the interim superintendent for about two months when, in a matter of hours, our entire digital infrastructure at LCPS was swept away.</em></p>
<p><em>Our IT director, Matt Dawkins, got a call around 7 a.m. that one of our employees was having trouble gaining access to the server. “It’s ransomware,” Matt said. By 7:30 <em>a.m</em>, it was confirmed that 90 percent of our server systems were crippled. Our financial systems, student information, printers — all data storage was out of reach.</em></p>
<p>In addition to teachers losing all access to the technological tools they had grown accustomed to using to teach, Ms. Trujillo faced a number of significant burdens, including:  “Matt’s team of 21 people worked 18-hour days through Thanksgiving, Christmas and beyond, scrubbing more than 30,000 devices that needed to be rebuilt.” And, despite having to go through a terrible experience, Ms. Trujillo sees a silver lining in suffering a ransomware attack:</p>
<p><em>We thought the ransomware attack was our disaster for the year, but just when we started to rise from the ashes, the global pandemic thrust us into another crisis. It was as if the ransomware was a trial run for the situation we are in now. We were able to flip the switch from children in classrooms to remote learning in a weekend, rather than months. We went from no technology for learning to only technology for learning. The new devices we ordered during ransomware arrived just in time to get them in the hands of students who needed them. A year later, we understand the reality of cyberattacks, and — as a global pandemic — we know that no one is immune. Since then, we have installed firewalls, updated our systems, invested in our teachers and improved our infrastructure so we can protect ourselves. As we navigate through this pandemic, we use what we learned during the ransomware attack to handle the current crisis.</em></p>
<p>Interestingly, the WSJ article found the “[a]verage ransom payments across all industries have climbed in recent years, to $233,817 in the third quarter of this year from $41,198 a year earlier.”  And, the amount demanded as a ransom is expected to continue to rise.  It is now clear that school districts must make preparing for ransomware attacks a priority. And, if there was not enough of an incentive already to prepare for a ransomware attack, <a href="https://privacyriskreport.com/this-summer-provides-a-unique-opportunity-for-student-data-privacy/" target="_blank">Illinois schools must be ready to implement additional steps by July 1, 2021, to meet the amended Student Online Personal Protection Act (“SOPPA”) requirements</a>.</p>
<p>In order to effectively protect employee and student data, schools must have answers to at least the following questions:</p>
<ul>
<li>Is the school district prepared for a ransomware attack?
<ul>
<li>Would the school district pay the ransom?</li>
<li>How much would the school district be willing to pay for a ransom?</li>
<li>Where does the school district get bitcoin to pay a ransom?</li>
<li>Can the school district continue to teach while information is encrypted?</li>
<li>Does the school district have insurance that covers a ransomware event?</li>
</ul>
</li>
<li>What third-party vendors is the school district providing student data to?</li>
<li>What third-party vendors are teachers providing student data to?</li>
<li>What safeguards do third party vendors have in place to protect student data?</li>
<li>Does the school district have insurance for a ransomware event at a vendor?</li>
<li>Are there any state laws that give rise to requirements in the school district?</li>
<li>Who in the school district will respond to students’ and parents’ questions about an incident?</li>
</ul>
<p style="text-align: center;">For more information about this article, contact Todd Rowe, working at home, of course, at <a href="mailto:trowe@tresslerllp.com" target="_blank">trowe@tresslerllp.com</a>.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/' data-emailit-title='Hackers See Opportunity In Attacking Schools As They Teach Through A Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/">Hackers See Opportunity In Attacking Schools As They Teach Through A Pandemic</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/hackers-see-opportunity-in-attacking-schools-as-they-teach-through-a-pandemic/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Step By Step Analysis of a Response to Recent Ransomware Attack</title>
		<link>https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=step-by-step-analysis-of-a-response-to-recent-ransomware-attack</link>
		<comments>https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/#comments</comments>
		<pubDate>Thu, 18 Aug 2016 21:10:14 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[California]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[ransomware]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=898</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/' data-emailit-title='Step By Step Analysis of a Response to Recent Ransomware Attack'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Ransomware attacks are on the rise and appear to be a long-term problem. For example, last February in California, the Orange County Transportation Authority (OCTA) suffered a ransomware attack that shut down a number of its computers, causing more than... <a class="more-link" href="https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/' data-emailit-title='Step By Step Analysis of a Response to Recent Ransomware Attack'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/">Step By Step Analysis of a Response to Recent Ransomware Attack</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/' data-emailit-title='Step By Step Analysis of a Response to Recent Ransomware Attack'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Ransomware attacks are on the rise and appear to be a long-term problem. For example, last February in California, the Orange County Transportation Authority (OCTA) suffered a ransomware attack that shut down a number of its computers, causing more than $600,000 in damages. Specifically, the OCTA reportedly paid nearly <a href="http://www.ocregister.com/articles/octa-724714-system-cost.html" target="_blank">$330,000 in labor costs and $218,000 for emergency contracts</a> for technical assistance with the incident. The attack is said to have <a href="https://voiceofoc.org/2016/08/transportation-authority-kept-secret-cyber-attack-that-cost-600000/" target="_blank">cut off access to 88 OCTA servers</a> that limited access to a number of programs including e-mail, voicemail, intranet, employee assignments and payroll. Rather than pay the requested $8,500 ransom, OCTA worked for days to restore the servers, find the malware and secure the servers against future attacks. OCTA officers stated that services were uninterrupted and no credit card or other personal information was compromised during the attack. This ransomware attack and the OCTA response provide a great opportunity to analyze the response in the hours, days and months after a ransomware attack.</p>
<p><strong>Hours After Cyber Attack: Pay $8,500 Ransom or $600,000 to Fight the Hackers</strong></p>
<p>In defending the decision to not pay the ransom, the OCTA spokesperson stated, “[t]he FBI opposes paying ransom for cyber attacks, and so does [the Transportation Authority]. If we pay ransom to a criminal, there is no guarantee that our servers would be released, and the agency would likely be a target again because the attackers know they pay up.&#8221;</p>
<p>Regardless of whether this decision was correct or not, it&#8217;s clear that victims will have to make the tough decision on whether to pay the ransom or fight their attackers in the first few hours after an attack. While there is no information about when OCTA made this decision, the best strategy includes considering the potential for an attack and having a plan prior to an attack. Here, OCTA adopted a philosophy not to pay the ransom. While there are valid arguments to both situations, there is no question that the best time to make this decision is before a ransomware attack.</p>
<p><strong>Days After Cyber Attack: Violation of California’s Open Meetings Law?</strong></p>
<p>Since the attack, people have started to question whether OCTA complied with California’s Open Meetings Law, which requires governmental entities to make information available to the public. The OCTA’s board members were not notified about the attack until it had been resolved and the public received no information beyond statements that OCTA was experiencing technical problems. Now that the attack has been disclosed, some opponents are questioning the OCTA’s $218,000 payment for security because it “was not on the agenda and it was authorized in an unlawful closed session.” The OCTA spokesperson reasoned that, “[t]he last thing we want to do is make a public announcement…why would you let people know that your systems are compromised? It would invite, potentially, other people to hit you.”</p>
<p>In the days after a cyber attack, the key for any organization will be to determine its obligations under various state and federal laws. One important question will be whether the private information of others was compromised in the attack. In this situation, OCTA stated “…in this crime against OCTA, information wasn’t lost or stolen and service wasn’t disrupted. If that had been the case, those impacted would have been notified…”</p>
<p>Therefore, the ransomware incident at OCTA demonstrates that different types of cyber crimes will give rise to different obligations for the victim. Further, this attack demonstrates the importance that an organization must consider all the various local, state and federal regulations that may apply given certain scenarios before an incident occurs.</p>
<p><strong>Months After Cyber Attack: Providing Notice and Protecting Against Future Attacks</strong></p>
<p>The OCTA ransomware incident was not publicly disclosed until the first week of August, nearly six months after the incident. While OCTA claims it waited to disclose this incident until it was certain that its systems were safe from further attacks, there is growing concern that a number of cyber incidents are not being reported for reasons other than safety. In fact, there may be a number of reasons to not disclose an incident. For example, there is significant evidence <a href="https://privacyriskreport.com/nothing-to-see-here-underreporting-cyber-security-incidents-impacts-cyber-insurance/" target="_blank">that the underreporting </a>of these incidents by government and corporate leaders comes from their worry about the impact an incident could have on their careers. Also, the risk that an entity’s reputation will be tarnished is another reason cyber incidents go unreported.</p>
<p>In the end, it is easy to second guess some of OCTA’s decisions in the time after the ransomware attack; anyone responsible for cyber security should assume their actions will be questioned after a cyber incident. However, the best way to survive this scrutiny is to consider as many cyber security issues before an incident ever happens.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/' data-emailit-title='Step By Step Analysis of a Response to Recent Ransomware Attack'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/">Step By Step Analysis of a Response to Recent Ransomware Attack</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/step-by-step-analysis-of-a-response-to-recent-ransomware-attack/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Rise of Ransomware and Cyberbullying Insurance</title>
		<link>https://privacyriskreport.com/the-rise-of-ransomware-and-cyberbullying-insurance/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-rise-of-ransomware-and-cyberbullying-insurance</link>
		<comments>https://privacyriskreport.com/the-rise-of-ransomware-and-cyberbullying-insurance/#comments</comments>
		<pubDate>Wed, 06 Apr 2016 20:26:47 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyberbully]]></category>
		<category><![CDATA[cyberbullying]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[damages]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[ransomware]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=666</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-rise-of-ransomware-and-cyberbullying-insurance/' data-emailit-title='The Rise of Ransomware and Cyberbullying Insurance'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Over the last few years, cyber security has focused on incidents where there is no contact with the criminal. That is, a data breach would occur and the criminal would be long gone before the victim knew there was an... <a class="more-link" href="https://privacyriskreport.com/the-rise-of-ransomware-and-cyberbullying-insurance/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-rise-of-ransomware-and-cyberbullying-insurance/' data-emailit-title='The Rise of Ransomware and Cyberbullying Insurance'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/the-rise-of-ransomware-and-cyberbullying-insurance/">The Rise of Ransomware and Cyberbullying Insurance</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-rise-of-ransomware-and-cyberbullying-insurance/' data-emailit-title='The Rise of Ransomware and Cyberbullying Insurance'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Over the last few years, cyber security has focused on incidents where there is no contact with the criminal. That is, a data breach would occur and the criminal would be long gone before the victim knew there was an issue. Recently, we have seen cyber security incidents evolve to a point where the victim and criminal must confront each other in some manner. One example is the <a href="http://money.cnn.com/2016/04/04/technology/ransomware-cybercrime/">rise of ransomware</a>, where the victim must negotiate with the criminal to regain access to their data. Some insurers have already responded to the ransomware risk by offering <a href="http://www.businesswire.com/news/home/20160404006016/en/Liberty-International-Underwriters-Adds-Cyber-Extortion-Endorsement">cyber extortion endorsements</a>.</p>
<p>Another example where victims and criminals interact is cyberbullying, where the victim is harassed by a criminal via e-mail or social media. Recent statistics show many schools and households are struggling with cyberbullying. For example, the <a href="http://www.stopbullying.gov/cyberbullying/">U.S. Department of Health and Human Services</a> provides the following facts and statistics related to cyberbullying:</p>
<ul>
<li>Cyberbullying can happen 24 hours a day, 7 days a week, and reach a kid even when he or she is alone.</li>
<li>Cyberbullying messages and images can be posted anonymously and distributed quickly to a very wide audience.</li>
<li>It can be difficult and sometimes impossible to trace the source. Deleting inappropriate or harassing messages, texts and pictures is extremely difficult after they have been posted or sent.</li>
</ul>
<p>Additionally, the 2013-2014 <a href="https://nces.ed.gov/programs/crimeindicators/crimeindicators2014/ind_11.asp">School Crime Supplement</a> (National Center for Education Statistics and Bureau of Justice Statistics) indicates that 7% of students in grades 6–12 experience cyberbullying. The 2013 <a href="http://www.cdc.gov/healthyyouth/data/yrbs/index.htm">Youth Risk Behavior Surveillance Survey</a> also finds that 15% of high school students (grades 9-12) were electronically bullied in the past year.</p>
<p>Last year, the Colorado legislature enacted “Kiana’s Law” to address cyberbullying. Kiana’s Law is named after <a href="http://www.thedenverchannel.com/news/local-news/bullied-by-text-messages-the-story-of-hope-behind-kianas-law">Colorado teenager Kiana Arellano</a>, who tried to commit suicide after receiving anonymous bullying text messages such as “you&#8217;re pathetic,” “nobody likes you at school” and telling Kiana she should kill herself. After attempting suicide, Kiana was left with a traumatic brain injury. The person that sent these messages was not prosecuted since there was no law prohibiting this conduct at the time.</p>
<p>Cyberbullying is not limited to children, as reports indicate that 73% of American adults online have seen someone be harassed online and 40% have personally experienced it. For example, musician Carrie Underwood was recently the <a href="http://www.inquisitr.com/2863446/carrie-underwood-targeted-by-online-bullies-over-fake-selfie/">target of cyberbullies</a> who accused her of being “fake” and having plastic surgery.</p>
<p>Under Kiana’s Law, cyberbullying is now a misdemeanor form of harassment in Colorado, punishable by a fine of up to $750 and/or up to six months in jail.</p>
<p>In December 2015, Chubb Insurance began offering cyberbullying insurance coverage in the United Kingdom for cyberbullying victims, including counseling and lost income benefits for work missed due to harassment. <a href="http://www.ibtimes.co.uk/cyberbullying-chubb-offers-troll-insurance-britons-1532658">Chubb’s policies define cyberbullying</a> as “three or more acts by the same person or group to harass, threaten or intimidate a customer.” Last week, Chubb expanded it’s cyberbullying coverage outside of the U.K. to customers in Colorado, Illinois, Indiana and Wisconsin, which will provide $60,000 toward expenses caused by cyberbullying to its policyholders.</p>
<p>It is becoming increasingly clear that cyber crime is evolving to catch victims before they have the opportunity to put safeguards in place. For example, just as corporations and individuals started implementing plans and insuring against a data breach risk, criminals changed tactics and moved onto ransomware and cyberbullying. Therefore, the only way to implement proper technology and insurance safeguards is to vigilantly monitor cyber crime trends.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-rise-of-ransomware-and-cyberbullying-insurance/' data-emailit-title='The Rise of Ransomware and Cyberbullying Insurance'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/the-rise-of-ransomware-and-cyberbullying-insurance/">The Rise of Ransomware and Cyberbullying Insurance</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/the-rise-of-ransomware-and-cyberbullying-insurance/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
